In a blockchain Data Availability Attack (DAA), a malicious node publishes a block header but withholds part of the block, which contains invalid transactions. Honest full nodes, which can download and store the full blockchain, are aware that some data are not available but they have no formal way to prove it to light nodes, i.e., nodes that have limited resources and are not able to access the whole blockchain data. A common solution to counter these attacks exploits linear error correcting codes to encode the block content. A recent protocol, called SPAR, employs coded Merkle trees and low-density parity-check codes to counter DAAs. In this paper, we show that the protocol is less secure than claimed, owing to a redefinition of the adversarial success probability. As a consequence we show that, for some realistic choices of the parameters, the total amount of data downloaded by light nodes is larger than that obtainable with competitor solutions.
翻译:在块链数据可用性攻击(DAA)中,一个恶意节点发布一个块页头,但保留了块块的一部分,其中含有无效交易。诚实的全节点可以下载和存储整个块链,知道有些数据没有现成的,但是它们没有正式的方式来证明它为光节点,即资源有限的节点,无法访问整个块链数据。对付这些攻击的共同解决办法是利用线性错误校正代码来编码块内容。最近的一项协议,称为SPAR,使用编码的默克尔树和低密度对等检查代码来对抗区块。在本文中,我们表明由于对对抗性成功概率的重新定义,协议比声称的要安全得多。结果我们表明,对于参数的某些现实选择,光节点下载的数据总量比用比较式解决方案获得的数据要大。